scholarly journals Secured and progressive transmission of compressed images on the Internet: application to telemedicine

Author(s):  
Marie Babel ◽  
Benoit Parrein ◽  
Olivier Deforges ◽  
Nicolas Normand ◽  
Jean-Pierre Guedon ◽  
...  
Author(s):  
Tughral Yamin

Cyberspace is at once an area of immense cooperation and a no-holds barred arena for competition. Difficulties in creating a stable environment in cyberspace stem from differing national perceptions regarding the freedom of the Internet, application of international law and problems associated with attribution. Information space has no borders and no recognized rules of engagement or internationally accepted regulatory mechanisms. State parties, freelancers, criminals and terrorists all consider cyber operations beyond the pale of international jurisdiction. Some agreements have emerged concerning cybercrime but cyber warfare remains outside binding legal obligations. In the absence of a consensus on treaty obligations, it is a good idea to begin by constructing credible confidence building measures (CBMs) in information space between rival states. The prospects of an unintentional war as a consequence of a cyber-attack can spell disaster for South Asia. This paper discusses a range of CBMs that can be created between India and Pakistan in cyber space to control malicious cyber behavior and avert an inadvertent war. It advocates cyber cooperation instead of cyber warfare.


2019 ◽  
pp. 141-204
Author(s):  
Tughral Yamin

Cyberspace is at once an area of immense cooperation and a no-holds barred arena for competition. Difficulties in creating a stable environment in cyberspace stem from differing national perceptions regarding the freedom of the Internet, application of international law and problems associated with attribution. Information space has no borders and no recognized rules of engagement or internationally accepted regulatory mechanisms. State parties, freelancers, criminals and terrorists all consider cyber operations beyond the pale of international jurisdiction. Some agreements have emerged concerning cybercrime but cyber warfare remains outside binding legal obligations. In the absence of a consensus on treaty obligations, it is a good idea to begin by constructing credible confidence building measures (CBMs) in information space between rival states. The prospects of an unintentional war as a consequence of a cyber-attack can spell disaster for South Asia. This paper discusses a range of CBMs that can be created between India and Pakistan in cyber space to control malicious cyber behavior and avert an inadvertent war. It advocates cyber cooperation instead of cyber warfare.


Author(s):  
Y. Yongling

Nanhai is a small city which belongs to Foshan City (a district can also be called a city in some cities of China) and lies in the central part of Guangdong province. It is in the hinterland of Pearl River Delta, close to Hong Kong and Macau. It was in 1995 that the city began to develop e-government. In September of 1996, it became one of the first cities that started to operate the Internet in China. Since 1999, the city had transferred into the period of Internet application. It became the national experimental field of an informalization process in 2000 and of an e-government application project and national information security project in 2001. However, since 2002, lots of problems have been appearing due to overemphasis on the construction of an information infrastructure and noticeable projects. Chinese e-government has been at the stage of a realistic period, with data shared among departments since 2000. Some weaknesses of the appraised projects have been appearing because of short service for urban development and the requirements from the city administration. Therefore, this case is just a description of the periodical success and would be a problematic case of the process of Chinese e-government.


2020 ◽  
pp. 1-16
Author(s):  
Agnieszka Piskorska

Abstract This paper deploys the tools of relevance theory to establish a common pragmatic mechanism operating in humorous texts (stand-up comedy, jokes, sketches) themed on the omnipresence of the Internet and social media in human life. It is postulated that this mechanism resides in incongruity between shared cultural assumptions expressing high esteem for rational actions and informative communication, and private assumptions endorsed by internet application users, who find phatic communication pleasurable. It is claimed that incongruity so understood is not a central but additional pragmatic mechanism in various humorous genres, and it tends not to be resolved, as tension between these two sets of assumptions lingers on.


2008 ◽  
Vol 32 (4) ◽  
pp. 258-269 ◽  
Author(s):  
Marie Babel ◽  
Benoît Parrein ◽  
Olivier Déforges ◽  
Nicolas Normand ◽  
Jean-Pierre Guédon ◽  
...  

1996 ◽  
Vol 42 (3) ◽  
pp. 504-512 ◽  
Author(s):  
A.Kh. Al Jabri ◽  
A.Kh. Al-Asmari

2018 ◽  
Vol 9 (2) ◽  
Author(s):  
Tatyana Vedernikova ◽  
Yury Golyandin

The article is devoted to description of the CyberArenaPro system for holding cyber competitions that provides convenience and ease of organizing competitions of various levels, allowing to hold competitions on the online venues around the world, increasing opportunities for participation in the competitions via the Internet and mobile devices. The program is designed to automate holding cybersport competitions of various levels (from local to international) and of any disciplines and formats. The system has a service-oriented architecture and uses the object-oriented Redis database. For a client implementation, the concept of Rich Internet Application, the ReactJS platform and the JavaSc programming language are applied. The server and the client applications are integrated with the API means. The automated system was tested during the organization of competitions in the computer club «CyberArena». Competitions were carried out in accordance with the discipline CS:GO, and 64 teams participated. The «CyberArenaPro» system can be used to organize competitions of any kind of sport.


2019 ◽  
Vol 8 (4) ◽  
pp. 10001-10003

The Internet application has dramatically expanded since the past decade, and such expansion has equally led to the increased risk in the Internet usage, especially in the domain of internet banking. The confidence level among different segments of e-banking users or customers is examined in this study, and the difference in outcomes are explained. Questionnaires were distributed to 315 respondents to obtain data. The obtained results show that different segments of users or customers show different levels of trust towards internet banking usage at Cairo Bank in Egypt. Additionally, different segments of users show different levels of perceived lack of information. Furthermore, the most notable segmentation can be split into three groups as follows: users or customers aged between 18-30, those aged above 60, and the rest. This study is of value to the security and marketing of internet banking services.


iBusiness ◽  
2011 ◽  
Vol 03 (04) ◽  
pp. 313-322 ◽  
Author(s):  
Hans Gottinger

Sign in / Sign up

Export Citation Format

Share Document